SLR-CK – 11 *SLRCK11* Seat No. M.Sc. – I (Semester – II) Examination, 2014 COMPUTER SCIENCE UML (Paper – VII) Day and Date : Thursday, 20-11-2014 Total Marks : 70 Time : 11.00 a.m. to 2.00 p.m. Instructions : I) Question No. 1 and 2 are compulsory. II) Attempt any three questions from Q. No. 3 to Q. No. 7. III) Figures to the right side indicate full marks. 1. A) Choose the correct alternatives : 10 1) The UML is a language for ___________ the artifacts of a softwareintensive system. a) Visualizing b) Documenting c) Both a) and b) d) None of the above 2) Structural things are the ___________ of UML models. a) Nouns b) Syntax c) Pronouns d) Verbs 3) Certain elements are hidden to simplify the view is known as __________ a) Elided b) Incomplete c) Execution d) Integrity 4) The __________ of a system encompasses the classes, interfaces, and collaborations that form the vocabulary of the problem and its solution. a) Design view b) Process view c) Use case view d) Implementation view 5) Class diagrams are grouped under ___________ a) Structural modeling b) Behavioral modeling c) Annotational modeling d) Process modeling P.T.O. SLR-CK – 11 *SLRCK11* -2- 6) _________ organizes the behaviors of the system. a) Class diagram b) Use case diagram c) Activity diagram d) Interaction diagrams 7) An ___________ is ongoing non atomic execution within state-machine. a) Activity b) Entity c) Process d) None of these 8) A collection of operations that are used to specify a service of a class or a component is known as ___________ a) Signal b) Node c) Interface d) Component 9) ___________ specifies that the source instantiates the target template using the given actual parameters. a) Derive b) Bind c) Friend d) None of these 10) Which of the following is the extensibility mechanism in the UML ? a) Stereotype b) Tagged value c) Constraints d) All the above B) State True or False : 4 1) Stub specifies a package that serves as a proxy for the public contents of another package. 2) Any sequence need not have a beginning. 3) A use case may have variants. 4) An event is the specification of a significant occurrence that has a location in time and space. 2. A) Write short notes on the following : 8 i) Generalization Relationship in UML. ii) Advanced Classes in UML. B) Write difference between following : i) Sequence diagram and collaboration diagram. ii) Simple class and active class. 6 *SLRCK11* -3- SLR-CK – 11 3. Answer the following : 14 1) Building Blocks of UML. 2) Explain Interfaces in UML. 4. Answer the following : 14 1) Explain Class Diagram in UML. 2) Explain Events and Signals. 5. Answer the following : 14 1) Explain different types of objects used in component Diagram. 2) Explain the Fork, Merge, Branch and Join from Activity Diagram in UML. 6. Answer the following : 14 1) Which are the Structural diagrams in UML ? Explain any one of them. 2) Draw use case diagram for Online Shopping System. 7. Explain the following terms : 14 1) Process and Threads. 2) State Machine. _______________ SLR-CK – 12 *SLRCK12* Seat No. M.Sc. – I (Semester – II) Examination, 2014 COMPUTER SCIENCE DBMS (Paper – VIII) Day and Date : Saturday, 22-11-2014 Time : 11.00 a.m. to 2.00 p.m. Total Marks : 70 Instructions : 1) Question No. 1 and 2 are compulsory. 2) Attempt any 3 questions from Q. No. 3 to Q. No. 7. 3) Figures to the right indicate full marks. 1. A) Choose correct alternatives : 10 1) ___________ is a collection of interrelated data and a set of programs to access those data. a) Program b) DBMS c) File d) None of these 2) The collection of information stored in the database at a particular moment is called ___________ of the database. a) Instance b) Schema c) Subschema d) None of these 3) A ___________ is an association among several entities. a) Attributes b) Entity c) Relationship d) Association 4) Data about data is called ___________ a) Attribute b) Entity c) Relation d) Metadata 5) In database system ___________ subsystem compiles and executes DDL and DML statements. a) Transaction manager b) Query processor c) Storage manager d) Buffer manager P.T.O. SLR-CK – 12 *SLRCK12* -2- 6) The set of permitted values for an attribute is called ___________ a) Field value b) Tuple c) Domain d) None of these 7) DCL stands for ___________ a) Data Control Language b) Domain Control Language c) Disk Control Language d) Data Compression Language 8) In SQL the ___________ statement is used to confer authorization. a) Update b) Revoke c) Grant d) Administration 9) We say that a relation schema R is in ___________ if the domains of all attributes of R are atomic. a) 2 NF b) 3 NF c) 1 NF d) 4 NF 10) ACID stands for ___________ a) Atomicity, Constraint, Isolation, Durability b) Atomicity, Constraint, Integrity, Durability c) Atomicity, Consistency, Integrity, Durability d) Atomicity, Consistency, Isolation, Durability B) Fill in the blanks : 4 1) ________ function returns the smallest integer greater than or equal to n. 2) In SELECT command __________ clause is used for getting rows from query in specific order. 3) In SQL __________ operator is used to compare multiple values. 4) __________ execution of transactions guarantees that consistency is preserved. 2. A) Write short notes on the following : 8 i) DBA ii) Integrity rules. B) Answer the following : i) What problems are caused by data redundancies ? Can data redundancies be completely eliminated when the database approach is used ? ii) What do you mean by function dependency ? Explain with example. 6 *SLRCK12* -3- SLR-CK – 12 3. Answer the following : a) Explain the architecture of DBMS. 8 b) Define various types of keys with example. 6 4. Answer the following : a) What is normalization ? Explain 3NF with example. 8 b) Explain multivalued functional dependency with suitable example. 6 5. Answer the following : a) What are the fundamental operations in relational algebra ? Explain with suitable example. 7 b) What are different symbols used in E-R diagram ? 7 6. Answer the following : a) Consider the relations : 8 SalesPerson(Sno, Name, Salary) Order(OrdNo. Sno. CustName, Amount) Customer(CustName, City) Write SQL commands for following queries : i) Find name and salary of all sales persons. ii) Names of sales persons who booked an order of at least Rs. 10,000/iii) Names of customers living in city “A” and ordered for at least Rs. 20/iv) Find total number of orders booked by customer “Sachin”. b) Explain the differences between standalone database and distributed database. 6 7. Answer the following : a) Explain view serializability and conflict serializability. 6 b) Describe nested tables and varying arrays. 8 _____________________ SLR-CK – 13 *SLRCK13* Seat No. M.Sc. – II (Semester – III) Examination, 2014 COMPUTER SCIENCE Paper – IX : Java Programming Day and Date : Friday, 14-11-2014 Time : 3.00 p.m. to 6.00 p.m. Max. Marks : 70 Instructions : 1) Question No. 1 and 2 are compulsory. 2) Attempt any 3 questions from Q. No. 3 to Q. No. 7. 3) Figures to the right indicate full marks. 1. A) Choose correct alternatives : 10 I) Which of the following statements about the Java language is true ? A) Java supports only procedural approach towards programming B) Both Procedural and Object Oriented Programming are supported in Java C) Java supports only Object Oriented Programming approach D) None of the above II) Which is not a valid keyword in java ? A) Null B) Transient C) Synchronized D) Native III) A collection of methods with no implementation is called an _________ A) Polymorphism B) Inheritance C) Interface D) Data Binding IV) If you access an uninitialized local variable will result A) Syntax Error B) Compile Time Error C) Run Time Error D) No Error V) Which is right way to creating an array of integer ? A) javaArray = new int[10]; B) javaArray new = myArray[10]; C) int[ ] javaArray = new int[10]; D) A) and C) both P.T.O. SLR-CK – 13 *SLRCK13* -2- VI) Which keyword is used to inherit class ? A) inherit B) extends C) inheritance D) extend VII) Program which executes applet is known as A) applet engine B) virtual machine C) JVM D) None of above VIII) What will be the output of the program ? class MyClass { int i; float j; public static void main(String[ ] args) { System.out.println(''i = '' + i +''j ='' + j); } } A) i = 0 j = 0.0 B) i = 0 j = 0.000000 C) Compile Time Error D) None of the above IX) Overloaded methods are differentiated by A) Number of arguments B) Data type of arguments C) Number and the data type of the arguments D) None of the above X) Package of drawstring( ) method is A) java.applet B) java.io C) javax.swing D) java.awt B) State true/false : i) JVM is platform dependent. ii) The modifiers public and static cannot written in either order “public static” or “static public”. iii) Interfaces can be instantiated. iv) Assignment operator is evaluated Left to Right. 4 *SLRCK13* -3- SLR-CK – 13 2. A) Write short notes on the following : 8 i) throw and throws. ii) break, continue and return. B) Answer the following : 6 i) Discuss various primitive data types supported by java. ii) Explain why java is considered as the best language for internet applications. 3. Answer the following : 14 A) What do you stand by multithread programming ? Explain with a simple suitable example. B) Write a program in java to create first 100 Fibonacci numbers. 4. Answer the following : 14 A) What are adaptor classes ? B) WAP to copy contents of one file to another file using FileInputStream and FileOutputStream classes. 5. Answer the following : 14 A) Assume that there is a table named as student in MS-Access with the following fields : Std_Rollno, name, course, ph_no. Write a java program to insert and then display the records of the table using JDBC. B) What are different ways to create threads ? Explain with examples. 6. Answer the following : 14 A) Define package. Explain how to create user defined packages in java. B) Explain about abstract classes and abstract methods. 7. Answer the following : 14 A) Explain life cycle of applet. Write a program to display image on Applet. B) Explain keyword super and this with a program. _____________________ SLR-CK – 14 *SLRCK14* Seat No. M.Sc. (Part – II) (Semester – III) Examination, 2014 COMPUTER SCIENCE Paper – X : Artificial Intelligence Day and Date : Monday, 17-11-2014 Time : 3.00 p.m. to 6.00 p.m. Max. Marks : 70 Instructions : I) Q. 1 and Q. 2 are compulsory. II) Attempt any three questions from Q. 3 to Q. 7. III) Figures to right indicate full marks. 1. A) Choose the correct alternative : 10 1) A _________________ has the necessary and sufficient means for general intelligent action. a) Psychological Symbol System b) Natural Language Symbol System c) Physical Symbol System d) None of these 2) The _________________ is a knowledge acquisition system for heuristic classification problem. a) SALT b) MOLE c) MYCIN d) DENDRAL 3) A ___________ is a process that converts a flat input sentence into hierarchical structure that corresponds to the units of meaning in the sentence. a) Syntactic Processing b) Case Grammar c) Fuzzy Logic d) Unification Grammars 4) The primitive act __________ stands for transfer of the abstract relationship. a) PTRANS b) MTRANS c) MBUILD d) ATRANS P.T.O. SLR-CK – 14 *SLRCK14* -2- 5) The _____________ operated by matching the left sides of the rules against the user’s last sentence and using the appropriate right side to generate a response. a) Pragmatics system b) Non-monotonic system c) ELIZA system d) Syntactic analysis 6) A measure of Belief measures the extent to which the ___________ supports the hypothesis. a) Fuzzy logic b) Evidence c) Hypothesis d) Certainty 7) A predicate form of sentence – “All literate, who are not illiterate are well-educated” can be represented as a) ∀ x : ¬ literate(x ) illiterate (x) → educated(x) b) ∀ x : illiterate(x) ¬ literate (x) → educated(x) c) ¬ literate (x) ¬ illiterate(x) → ¬ educated(x) d) ∀x : literate (x) ¬ illiterate(x) → educated(x) 8) A most commonly used procedure is _____________ , which exploits a proof by contradiction strategy. a) Procedural knowledge b) Resolution c) Computable functions d) Bayes theorem 9) A most useful form of inference is _________ , in which elements of specific classes inherit attributes and values from more general classes in which they are included. a) Inferential efficiency b) Procedural inheritance c) Property inheritance d) None of these 10) To build a system to solve a particular problem, there is a need to do ____________ and represent the task knowledge that is necessary to solve the problem. a) Define the problem b) Analyze the problem c) Search d) Isolate *SLRCK14* -3- SLR-CK – 14 B) State True or False : 4 1) P(Hi\E) is the probability we will observe evidence E given that hypothesis i is true. 2) Mundane tasks include task related to Games, Mathematics. 3) In monotonic production system, the application of a rule never prevents the later application of another rule that could also have been applied at the first rule was selected. 4) To continue the search until no such drastic change occurs from one level to the next is called as waiting for quiescence. 2. A) Write a short note : 8 1) Constraint Satisfaction 2) Semantic Net. B) Answer the following : 6 1) What do you mean by Frames ? 2) State in brief Fuzzy Logic. 3. Answer the following : A) What do you mean by Heuristic ? Discuss Blocks word problem as shown in figure using Local and Global heuristic function. 7 B) Define Expert Systems. Explain in detail Expert System Shell and capabilities needed as part of Explanation. 7 SLR-CK – 14 -4- *SLRCK14* 4. Answer the following : A) Define Reasoning. Describe in detail various Matching strategy. 7 B) Define Script. Write a Computer Laboratory script with a story : 7 “Sushant went to Computer Lab. He Turn on Computer. He started application to draft JAVA program. He compiles program with no errors. He went to Professor to note down the assignment.” 5. Answer the following : A) State and discuss in detail key dimensions of Problem Characteristics. 7 B) Define Artificial Intelligence. Discuss in detail various approaches to knowledge representation. 7 6. Answer the following : A) Discuss in detail steps involved to convert well formed formulas to Conjunctive Normal Form with suitable example. 7 B) What do you mean by Natural Language Processing ? Discuss and differentiate the steps in Natural Language Processing. 7 7. Answer the following : A) Discuss in detail the Water Jug Problem with 5-gallon and 7-gallon jug; neither has any markers on it. How to get exactly 1 gallon of water into 7-gallon jug ? 7 B) Discuss in detail the procedure of MINMAX search in Game Playing. _____________________ 7 SLR-CK – 15 *SLR-CK-15* Seat No. M.Sc. (Part – II) (Semester – III) Examination, 2014 COMPUTER SCIENCE Mobile Computing (Paper – XI) Day and Date : Wednesday, 19-11-2014 Time : 3.00 p.m. to 6.00 p.m. Max. Marks : 70 Instructions : 1) Question No. 1 and 2 are compulsory. 2) Attempt any 3 questions from Q. No. 3 to Q. No. 7. 3) Figures to the right indicate full marks. 1. A) Choose correct alternatives : 10 i) Several antennas can be combined on single pole to construct a) Clustered Cell c) Sectorized Antenna b) Clustered Antenna d) Antenna Group ii) ________________ is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link. a) Demodulating b) Multiplexing c) Compressing d) None of the above iii) The systems were “cellular” because coverage areas were split into _____________ each of which is served by a low power transmitter and receiver. a) cells c) cluster b) channels d) capacity iv) Larger cells are more useful in _____________ a) densely populated urban areas b) rural areas c) lightly populated urban areas d) mountainous areas v) BSS in GSM stands for _____________ a) Basic Service Set b) Base Station Subsystem c) Basic Station System d) Basic Service System P.T.O. SLR-CK – 15 *SLR-CK-15* -2- vi) Beacon contains a) Timestamp b) Synchronization information c) Power Management and Roaming Information d) All of these vii) What is the basic service unit of cellular telephony ? a) Location area b) Cell c) PLMN service area d) MSC/VLR service area viii) MSISDN number consists of a) Country Code b) National Destination Code c) Subscriber number d) All of these ix) In IEEE 802.11 Wireless LAN which signal is used for synchronization. a) Probe b) Beacon c) PS Poll d) Sync x) Which of the following is not a classical TCP mechanism ? a) Slow Start b) Fast recovery c) Selective retransmission d) Congestion control B) Fill in the blanks or True/False : 4 i) _____________ protocol is used for IEEE 802.11 physical layer frame. ii) Access Point in main controller in ad-hoc wireless network. (True/False) iii) In PRMA _____________ reservation scheme is used. iv) In DSSS chipping sequence is used to spread the signal. (True/False) 2. A) Write short notes on the following : (4+4) i) Mobile TCP ii) Piconet. B) Answer the following : i) Discuss about MOC. ii) Explain signal propagation. (3+3) *SLR-CK-15* -3- SLR-CK – 15 3. Answer the following : (7+7) A) How the problem of hidden and exposed terminal is solved using MACA ? B) What is digital modulation ? Explain three basic techniques of it. 4. Answer the following : (7+7) A) Explain different mobile services provided by GSM. B) How the power management is performed in IEEE 802.11 ? 5. Answer the following : (7+7) A) Explain FHSS in detail with types of hopping. Give the description about its transmitter and receiver with diagram. B) What are the various issues to be considered in designing the wireless LAN environment ? 6. Answer the following : (7+7) A) What are the different entities and terminologies for mobile IP ? B) Discuss in detail the Mobile Terminated Call scheme. 7. Answer the following : (7+7) A) Explain indirect TCP with advantages. B) What is handover ? Explain its types with diagram. _____________________ SLR-CK 16 *SLRCK16* S N e o a t . M.Sc. (Part II) (Semester III) Examination, 2014 COMPUTER SCIENCE (Paper XII) Modeling and Simulation Day and Date : Friday, 21-11-2014 Time : 3.00 p.m. to 6.00 p.m. Total Marks : 70 Instructions : 1) Question No. 1 and 2 are compulsory. 2) Attempt any three questions from Q. 3 to Q. 7. 3) Figures to the right indicate full marks. 1. A) Select the correct alternative : 10 i) PERT is used for the project involving activity of non-repetitive nature in which time estimation are __________ a) Certain c) Deterministic b) Uncertain d) Both b) and c) ii) Simulation of system in which the state changes smoothly with time are called _____________ a) Continuous system c) Both a) and b) b) Discrete system d) None of these iii) Which of the following is not an assumption underlying the fundamental problem of EOQ ? a) Demand is known and uniform b) Holding cost per unit per time is constant c) Lead time not zero d) Shortages are not permitted iv) In queue model completely specified in the symbolic form (a/b/c/) : (d/e), the third symbol c specifies ____________ a) The number of customers arrive b) The number of servers c) The distribution of arrival d) The distribution of departure P.T.O. SLR-CK 16 *SLRCK16* -2- v) If in Markov chain of two states j and k, one step transition probabilities are Pjj = 1, Pjk = 0, Pkj = 0, Pkk = 1 then value of a) 0.5 c) 0.4 ( 4 is ) 2 j k b) 1 d) 0 vi) For _______________ distribution mean and variance are same. a) Binomial distribution b) Poisson distribution b) Bernoulli distribution d) None of these vii) The time interval between successive arrival of customer in the queue follows ________________ distribution. a) Geometric c) Binomial b) Hypergeometric distribution d) Exponential viii) Time gap between placing of an order and its actual arrival in the inventory is known as ______________ a) Lead time c) Both a) and b) b) Demand d) None of the above ix) In M/M/1 : /FCFS queue model if is mean customer arrival rate and is the mean service rate then the probability of server being busy is equal to a) b) c) d) x) Markov chain said to be erotic chain if ________________ of whose states are ergodic. a) One b) Some c) All d) None B) Fill in the blanks : 4 i) The long form of the CPM is ____________ ii) Chapman-Kolmogorov equation is Pij (t + T) = ______________ iii) The time between the placement of two successive order is referred as an ___________ iv) Let is arrival rate and is service rate, if and ______________ with time. > the queue is formed *SLRCK16* SLR-CK 16 -3- 2. A) i) What are the advantages and disadvantages of simulation ? ii) Explain the concept of anticipation inventory with example. 4 4 B) i) A road transport company has one reservation clerk on duty at a time. He handles information of bus schedules and makes reservations. Customers arrive at a rate of 8 per hour and the clerk can service 12 customers on an average per hour. After stating your assumption, find the average waiting time of customer. ii) Write a note on queue configuration. 3. A) Explain the pure birth process. 3 3 7 B) The demand rate for a particular item is 12000 units/year. The ordering cost of Rs. 1000 per order and the holding cost is Rs. 0.80 per month. If no shortage are allowed and the replacement is instantaneous the determine 7 i) Economic order quantity ii) Number of order per year. 4. A) Describe the deterministic inventory model of EOQ with uniform demand and no shortages. 7 B) For various activity in the particular project the expected time (in days) of completions are as follow : 7 A D u c r t i a v t i i t o y n ! $ ! $ ! & " ! # " " # ! Draw a network diagram and identify the critical path. 5. A) Generate the five successive random number Xi, i = 1, 2, 3, 4, 5 by using Xi + 1 = Xi*a (modulo m), starting with seed X0 = 3 and parameters a = 7 and m = 15 (where m means that the number {Xi*a} is divided by m repeatedly till the reminder is less than m). B) Explain the system of steady-state equation. 6. A) Give the steps of Monte-Carlo simulation. B) Explain the generation of a random sample from exponential distribution. 7 7 7 7 7. A) Explain the concept of queue discipline. 7 B) Explain the Poisson process {N(t); t process. 7 0}. Show that N(t) follows Poisson _____________________ SLR-CK 17 *SLRCK17* S N e o a t . M.Sc. (Part II) (Sem. IV) Examination, 2014 COMPUTER SCIENCE (Paper XIII) Distributed Operating System Day and Date : Saturday, 15-11-2014 Time : 3.00 p.m. to 6.00 p.m. Max. Marks : 70 Instructions : 1) Question No. 1 and 2 are compulsory. 2) Attempt any 3 questions from Q. No. 3 to Q. No. 7. 3) Figures to the right indicate full marks. 1. A) Choose correct alternatives : 10 1) In a __________ (loosely coupled) system, the processors do not share memory or a clock. A) Multiprocessor B) Distributed C) Remote D) Local 2) __________ communication is from one sender to multiple receivers. A) Many to one B) Many to many C) One to many D) One to one 3) LAN stands for __________ A) Large Area Network B) Local Area Network C) Long Area Network D) Lower Area Network 4) The software layer, nearest to hardware, which facilitates launching all the other software utilities and application, is called the __________ A) Information technology B) Information system C) Operating system D) All of the above 5) All distributed systems are __________ A) SISD B) SIMD C) MISD D) MIMD P.T.O. SLR-CK 17 -2- *SLRCK17* 6) ISO stands for __________ A) International Organization for Standardization B) International Standard Organization C) International Standard Operation D) Important Standard Operation 7) When a packet is sent to an address, it is automatically delivered to all machines listening to the address. This technique is called __________ A) Unicasting B) Broadcasting C) Multicasting D) Point to point transmission 8) A _________ OS allows and manages several programs to be simultaneously resident in main memory. A) Multi-programming B) Single-programming C) External-programming D) All of the above 9) When the job is completed, the output is actually printed; this form of processing is called ____________ A) Resource allocator B) Control program C) Spooling D) All of the above 10) A computer system dedicated to a single user. This type of computer system is usually referred to as ___________ A) Mainframe computer B) Mini computer C) Super computer D) Personal computer B) State true or false : 1) An open system is prepared to communicate with any other open system by using standard rules. 2) Packing parameters into a message is called parameter marshalling. 3) Location transparency does not refer to the fact that is in a true distributed system. 4) Concurrency transparency means multiple users can share resources automatically. 4 *SLRCK17* -3- SLR-CK 17 2. A) Write short notes on the following : 8 i) Remote access file service interface. ii) Lamports happens before relation. B) Answer the following : 6 i) What do you mean by Windows NT and Novel Netware ? ii) What do you mean by Client server model ? 3. Answer the following : 14 A) Define deadlock. State and explain in detail the necessary conditions to occur a deadlock. B) Explain in detail Layered protocol with necessary diagram. 4. Answer the following : 14 A) Explain in detail the concept of remote procedure call. B) Explain in detail how deadlock prevention took place in distributed systems. 5. Answer the following : 14 A) What is the mutual exclusion ? Explain the central and distributed algorithms. B) What is distributed file system ? Explain the implementation of it in detail. 6. Answer the following : 14 A) Explain in detail the workstation model as the system model. B) Explain in detail the concept of atomic transaction. 7. Answer the following : 14 A) Define Thread. Explain in detail the thread usage in terms of three organizations of it in a process. B) Explain in detail advantages and disadvantages of distributed systems over centralized and over personal computer systems. _____________________ SLR-CK – 18 *SLRCK18* Seat No. M.Sc. (Semester – IV) Examination, 2014 COMPUTER SCIENCE Data Mining and Warehouse (Paper – XIV ) Day and Date : Tuesday, 18-11-2014 Time : 3.00 p.m. to 6.00 p.m. Max. Marks : 70 Instructions : 1) Question No. 1 and 2 are compulsory. 2) Attempt any 3 questions from Q. No. 3 to Q. No. 7. 3) Figures to the right indicate full marks. 1. A) Choose correct alternatives : 10 1) The following is true of three-tier data warehouses a) Once created, the data marts will keep on being updated from the data warehouse at periodic times b) Once created, the data marts will directly receive their new data from the operational databases c) The data marts are different groups of tables in the data warehouse d) A data mart becomes a data warehouse when it reaches a critical size 2) __________ will answer questions you did not think to ask of your data. a) Data mining b) Data extrapolation c) Knowledge discovery d) Data enlightenment 3) The following technology is not well-suited for data mining a) Expert system technology b) Data visualization c) Technology limited to specific data types such as numeric data types d) Parallel architecture 4) The slice operation performs a selection on ___________ of the given cube. a) One dimension b) Two dimension c) More than two dimension d) None of the above P.T.O. SLR-CK – 18 -2- *SLRCK18* 5) ________ is the oldest and most well known statistical technique that the data mining community utilizes. a) Regression b) Clustering c) Decision Trees d) None of the above 6) It is difficult to find strong associations among data items at low or primitive levels of abstraction due to the ___________ of data in multidimensional space. a) Sparsity b) Scarcity c) Plenty d) Excess 7) ___________ attributes are numeric and have an implicit ordering among values. a) Quantitative b) Nominal c) Categorical d) None of the above 8) In the K-means clustering algorithm the distance between cluster centroid to each object is calculated using __________ method. a) Euclidean distance b) Clustering distance c) Central distance d) Cluster width 9) Hierarchical clustering may be represented by a two-dimensional diagram known as ____________ a) Dendrogram b) Cladogram c) Histogram d) None of the above 10) ___________ is the process of removing attributes in the data that are irrelevant to the classification or prediction task. a) Relevance analysis b) Data cleaning c) Data transformation d) Normalization B) Fill in the blanks : 1) Regression, classification and __________ are the data mining tasks. 2) The process of removing the deficiencies and loopholes in the data is called as _____________ up of data. 3) Pivot is also called ___________ 4) The _____________ schema is a variant of the star schema model, where some dimension tables are normalized. 4 *SLRCK18* -3- SLR-CK – 18 2. A) Write short notes on the following : 8 i) Data Transformation ii) Model-Based Clustering. B) Answer the following : 6 i) What is data cube ? Explain star schema. ii) Explain in short types of data in cluster analysis. 3. Answer the following : A) Explain data mining applications. 7 B) Explain data mining primitives with example. 7 4. Answer the following : A) Discuss 3-tier architecture of data warehouse with a neat diagram. Explain in detail the functionality of each component. 8 B) What is noisy data ? Explain different techniques to smooth out the data to remove the noise. 6 5. Answer the following : A) Explain decision tree induction method. 7 B) What are the different criteria on which classification and prediction methods can be evaluated ? 7 6. Answer the following : A) Discuss the concepts of frequent itemset, support and confidence. 7 B) Explain trends in data mining. 7 7. Answer the following : A) What is meant by hierarchical clustering ? Explain, how agglomerative method is different from divisive clustering method. 8 B) Explain Bayesian classification scheme. 6 _____________________ SLR-CK – 19 *SLR-CK-19* Seat No. M.Sc. – II (Semester – IV) Examination, 2014 COMPUTER SCIENCE Digital Image Processing (Paper – XV) Day and Date : Thursday, 20-11-2014 Time : 3.00 p.m. to 6.00 p.m. Max. Marks : 70 Instructions : 1) Question No. 1 and 2 are compulsory. 2) Attempt any 3 questions from Q. No. 3 to Q. No. 7. 3) Figures to the right indicate full marks. 1. A) Choose correct alternatives : 1) The outputs of object recognition are generally 10 a) Images b) Attributes of images c) Both images and attributes of images d) Either images or attributes of images 2) An image of size 10 × 5 pixel formed with 256 gray levels need ______________ bits of storage space. a) 400 b) 50 c) 12800 d) 500 3) D4 distance between (7, 3) and (5, 8) is ______________ a) 3 b) 1 c) 5 d) 13 4) Averaging filter is a ______________ a) Smoothing linear filter b) Sharpening linear filter c) Order statistics filter d) Median filter 5) Arrange the following filters from very smooth filter to very sharp filter. a) Butterworth filter, Gaussian filter, Ideal filter b) Gaussian filter, Butterworth filter, Ideal filter c) Ideal filter, Gaussian filter, Butterworth filter d) Ideal filter, Butterworth filter, Gaussian filter P.T.O. SLR-CK – 19 -2- *SLR-CK-19* 6) Midpoint filter is one of the ______________ filters. a) Mean b) Adaptive c) Order statistics d) Frequency domain 7) To eliminate small holes in the image the best morphological tool is ______________ a) Dilation b) Erosion c) Opening d) Closing 8) In an image whose gray level profile is ramp or slope, its first order derivative is ______________ a) Zero b) Constant c) Monotonically increasing d) Transition between positive and negative 9) The four directional chain code of an object is 0003230322210121. Its shape number is ______________ a) 0033113300331133 b) 0033003311331133 c) 0033113311330033 d) 0033003311330033 10) The American Banker Association E-13B character recognition system recognizes the characters based on the ______________ a) Area of ink under reader head b) Difference of area of ink between previous and present position c) Width of ink bar d) Length of ink bar B) Fill in the blanks : 1) The distance between a pixel and its diagonal neighbour is ______________ units. 2) According to Fourier any function which periodically repeats itself may be written as the ______________ of different frequencies, each multiplied by a different coefficient. 3) The translation of set A by point Z = {z1 , z2}, denoted (A)z is defined as ______________ 4) The expression y = A(x – mx) is called as ______________ 4 2. A) Write short notes on the following : i) Role of bit planes in image. ii) How homomorphic filtering differs from other frequency domain filtering ? Discuss. 8 *SLR-CK-19* -3- SLR-CK – 19 B) Answer the following : i) Find the shortest digital path between P and Q using m-adjacency. ii) Use the specific primitives a, b, c and d given as 6 and respectively and build the following structure : 3. Answer the following : A) Explain nearest neighbourhood, pixel replication and bilinear interpolation techniques. B) Perform opening of following structure using a circle of 1 cm radius : 14 SLR-CK – 19 *SLR-CK-19* -4- 4. Answer the following : 14 A) Discuss similarity and dissimilarity between different basic gray level transformations. B) Fill the following region using morphological region filling algorithms : 5. Answer the following : 14 A) Discuss one dimensional Fourier transform and its inverse with an example. B) Compute the covariance matrix for the following vectors : (0, 1, 0, 0)T, (0, 0, 0, 1)T, (1, 1, 1, 1)T and (1, 0, 1, 0)T. 6. Answer the following : 14 A) What are the different types of discontinuities ? How they are detected ? Briefly explain. B) The two classes of objects denoted by ω1 and ω2 have sample mean vectors m1 = (2, 7, 5) and m2 = (8, 4, 2) respectively. Compute decision boundary between these two objects. 7. Answer the following : 14 A) Explain minimum distance classifier method for pattern matching with example. B) Compute the distances between following objects and find out which of them are nearest : (a) (b) (c) _____________________ (d) *SLRCK20* SLR-CK – 20 Seat No. M.Sc. – II (Semester – IV) (Computer Science) Examination, 2014 .NET (Paper – XVI) Day and Date : Saturday, 22-11-2014 Time : 3.00 p.m. to 6.00 p.m. Max. Marks : 70 Instructions : 1) Question No. 1 and 2 are compulsory. 2) Attempt any 3 questions from Q. No. 3 to Q. No. 7. 3) Figures to the right indicate full marks. 1. A) Each question below gives a multiple choice of answers, choose the most appropriate one : 10 1) A ______________ can override method from its base class. a) sub class b) sealed class c) partial class d) super class 2) A ______________ method of class that’s run as soon as it is instantiated. a) constructor b) accessor c) mutator d) init() 3) The + = and – = are ______________ kind of operator. a) binary b) ternary c) unary d) compound 4) There are about ______________ reserved words in C#. a) 87 b) 77 c) 76 d) 78 5) ______________ is the way of listing all of the namespaces used in the program. a) Namespace b) Using c) Include d) Import 6) An instance of ___________ collection only works with one specific type. a) Dictionary b) List c) Generic d) Array P.T.O. SLR-CK – 20 -2- *SLRCK20* 7) All generic collection implements ______________ interface. a) Innumerable b) Enumeration c) Generic d) Abstract 8) ______________ is an easy way to keep track of categories. a) Enum b) Attributes c) Modifiers d) Constants 9) ______________ binary formatter method reads an object from stream. a) Serialize b) Desearialize c) Marshall d) UnMarshall 10) ______________ encoding system that assigns unique number of each character. a) Unicode b) Binary c) EBCDIC d) ASCII B) State following statements are true or false : 4 1) Fileinfo class lets user perform all operations in the file class for specific file. 2) Accessor method gets the value of a property. 3) The Tab control of windows form that lets you to create tabbed application. 4) Two references means there are two ways to change an objects data. 2. A) Write short notes on the following : 8 i) Core services of DOT NET Framework. ii) DOT NET Layered architecture. B) Answer the following : i) Can constructor of class is defined as static ? Explain with example. ii) What is Delegate ? Explain the properties of Delegate. 6 *SLRCK20* -3- SLR-CK – 20 3. Answer the following : A) Differentiate in between ASP and ASP.NET. 7 B) What are sealed classes ? What is the benefit of using sealed class ? 7 4. Answer the following : A) What is master page ? Write stepwise process of creating master page. 7 B) What is inheritance ? Explain how inheritance is restricted in C#. 7 5. Answer the following : A) What is difference in regular object reference and an interface reference ? 7 B) Write C# program to find maximum and minimum number from an array. 7 6. Answer the following : A) Explain ASP.NET page events and attributes of page directives with example. 7 B) What is Validator ? Describe purpose of regular expression validator with example. 7 7. Answer the following : A) Explain classification of DOT NET Data providers. 7 B) Define WebForm. Explain how to maintain the state of Webform with suitable example. 7 _____________________ SLR-CK – 1 *SLRCK1* Seat No. M.Sc. – I (Semester – I) Examination, 2014 COMPUTER SCIENCE (New) Object Oriented Programming using C++ (Paper – I) Day and Date : Friday, 14-11-2014 Time : 11.00 a.m. to 2.00 p.m. Max. Marks : 70 Instructions : 1) Question No. 1 and 2 are compulsory. 2) Attempt any three questions from Q. No. 3 to Q. No. 7. 3) Figures to the right indicate full marks. 1. A) Choose correct alternatives : 10 1) Which of the following is not a type of constructor ? A) Copy constructor B) Friend constructor C) Default constructor D) Parameterized constructor 2) Which of the following is not the member of class ? A) Friend function B) Static function C) Const. function D) Virtual function 3) A class is a ___________ data type. A) Primitive B) Derived C) User-defined D) All of these 4) ___________ keyword is used to declare integer variables. A) int B) Integer C) Float D) Character 5) Which of the following approach is adapted by C++ ? A) Top-down B) Bottom-up C) Right-left D) Left-right 6) A/an ___________ function is a function that is expanded in line when it is invoked. A) Inline B) Friend C) Complex D) Member P.T.O. SLR-CK – 1 *SLRCK1* -2- 7) Which of the following concepts means wrapping up of data and function together ? A) Abstraction B) Inheritance C) Polymorphism D) Encapsulation 8) Which of the following problem causes an exception ? A) A run-time error B) A problem in calling function C) A syntax error D) Missing semicolon in statement in main() 9) The mechanism of deriving a new class from base is known as ___________ A) Abstraction B) Inheritance C) Polymorphism D) Encapsulation 10) The scope resolution operator is represented by ___________ A) ?: B) -> C) :: D) # B) State whether following statements are true or false : 4 1) Manipulators are operators that are used to format the data display. 2) A constructor has the different name as that of a class. 3) A virtual function can be a friend of another class. 4) By default, members of the class are public. 2. A) Write a short note on following : 8 i) Algorithm ii) Inline function B) Answer the following : i) What is function prototyping ? Explain with example. ii) Explain difference between structure and union. 6 *SLRCK1* -3- SLR-CK – 1 3. Answer the following : A) What is arrays of object ? Explain with example. 7 B) Explain the use of new and delete operator with example. 7 4. Answer the following : A) Explain the importance of pointers to object with example. 7 B) Write a program in C++ to overload unary minus (–) operator. 7 5. Answer the following : A) What is inheritance ? Explain different types of inheritances with example and syntax. 7 B) What is virtual function ? Explain characteristics of virtual function. 7 6. Answer the following : A) Write a program to implement parameterized constructor. 7 B) What is manipulator ? Explain the use of width() and fill() manipulators. 7 7. Answer the following : A) What is file ? Explain different types of files. 7 B) Write a program which contains class named ‘MATRIX’. This class should include two member functions get() and put() to input elements in matrix of order 3×3 and display only diagonal elements of that matrix respectively. _____________________ 7 SLR-CK – 2 *SLRCK2* Seat No. M.Sc. – I (Semester – I) Examination, 2014 COMPUTER SCIENCE (Paper – II) Numerical Analysis (New) Day and Date : Monday, 17-11-2014 Time : 11.00 a.m. to 2.00 p.m. Max. Marks :70 Instructions : 1) Q. No. 1 and Q. No. 2 are compulsory. 2) Attempt any three questions from Q. No. 3 to Q. No. 7. 3) Figures to the right indicate full marks. 4) Use of calculator is allowed. 1. A) True or False (one mark each) : 4 i) Error in Trapezoidal rule is – (b – a) y(x). ii) Newton’s forward interpolation formula is useful for interpolation near the beginning of tabular values. iii) Secant method is also called regula falsi method. iv) Gaussian elimination method is used to reduce the given system to upper triangular system. B) Choose correct alternative (one mark each) : 5 i) The real root of the equation x3 – 9x + 1 = 0 lies between _____________ a) 0 and 1 b) 1 and 2 c) 2 and 3 d) 3 and 4 ii) If f(1) = 1, f(2) = 4, f(3) = 9, f(4) = 16 then this tabular values are interpolated by a polynomial p(x) of degree _____________ a) 2 b) 3 c) 4 d) 5 iii) If xn is the nth iterate, the Newton Raphson formula is given by ____________ f (x n ) a) xn + 1 = xn – f′(x ) n f(x n ) b) xn +1 = xn – f ( x ) n f ( xn ) c) xn + 1 = xn + f ′(x ) n d) None of these P.T.O. SLR-CK – 2 *SLRCK2* -2- iv) While applying Simpson’s 1 rd rule the number of subintervals should be 3 ______________ a) Multiple of 3 b) Multiple of 5 c) Odd d) Even v) If f(0) = 1 and f(1) = 3 then the unique polynomial of degree 1 is __________ a) 3 – 2x b) x – 3 c) 2x + 1 d) 2x – 1 C) Define the following (one mark each) : 5 i) Round off error ii) Rate of convergence iii) Newton’s forward difference interpolation formula iv) Eigen value and eigen vector of matrix v) Significant digits. 2. i) Write the error’s in trapezoidal, Simpson’s 1 rd 3 and Simpson’s 3 8 th rule. ii) Using Lagrange’s interpolation formula find sin (3) from following tabular values. x 0 y = sinx 0 2 3 4 4 0.9093 - 0.7568 iii) Write Newton’s forward and backward interpolation formula. 3 iv) Prove that : 4 δ2 a) μ = 1 + 4 2 b) Δ − ∇ = Δ∇ 3. i) Derive Newton’s divided difference interpolation formula. ii) Perform four iterations of Newton Raphson method to find a real root of the equation x3 – 5x – 4 = 0. 7 7 *SLRCK2* -3- SLR-CK – 2 4. i) Explain Bisection method. 7 ii) Apply Lagrange’s method to find a cubic polynomial which approximates the following data : x -2 -1 2 3 y = f(x) - 12 -8 3 5 5. i) Use Gauss elimination to solve : 7 6 10x + y + z = 12 2x + 10y + z = 13 x + y + 3z = 5 1 ii) Evaluate ∫ 0 1 1+ x 2 dx using Trapezoidal rule with h = 0.1. 8 6. i) Find the largest eigen value and corresponding eigen vector of the matrix − 1⎤ ⎥ 4⎥ ⎥ 10 ⎥⎦ ⎡ 1 3 ⎢ ⎢ 3 2 A= ⎢ ⎢⎣ − 1 4 7 ii) Given the differential equation y′′ − xy′ − y = 0 with the conditions y(0) = 1, y’(0) = 0. Use Taylor’s series method to determine the value of y(0.1). ⎡4 3 ⎢ ⎢2 3 7. i) Decompose the matrix A = ⎢ ⎢⎣ 1 2 7 2⎤ ⎥ 4⎥ ⎥ in to the form LU, where L is a lower 1⎥⎦ triangular matrix and U is unit upper triangular matrix. 7 ii) Using Newton’s forward interpolation formula to find y(4) from following data : 7 x 3 5 7 9 y = f(x) 13 31 57 91 11 111 –––––––––––––––––––– SLR-CK – 3 *SLRCK3* Seat No. M.Sc. (Part – I) (Semester – I) Examination, 2014 COMPUTER SCIENCE Paper – III : Software Engineering (New) Day and Date : Wednesday, 19-11-2014 Time : 11.00 a.m. to 2.00 p.m. Total Marks : 70 Instructions : 1) Question No. 1 and 2 are compulsory. 2) Attempt any three questions from Q. No. 3 to Q. No. 7. 3) Figures to the right indicate full marks. 1. A) Choose correct alternative : 10 1) Which of the following is a tool in design phase ? a) Abstraction c) Information hiding b) Refinement d) All of these 2) Which of the items listed below is not one of the software engineering layers ? a) Process b) Tools c) Methods d) Manufacturing 3) Data dictionary contains details of a) Data structures c) Data stores b) Data flows d) All of these 4) SRS stands for _______________ a) Software Requirement Specification b) Software Requirement Solutions c) System Requirement Specification d) None of the above 5) If requirements are frequently changing, which model is to be selected ? a) Waterfall model b) Prototyping model c) Iterative model d) RAD model P.T.O. SLR-CK – 3 *SLRCK3* -2- 6) Which is not a characteristics of a good SRS ? a) Correct b) Complete c) Consistent d) Brief 7) Which one is a quality attribute ? a) Reliability b) Availability c) Security d) All of the above 8) DFD stands for _________ a) Data Flow Design b) Data Flow Diagram c) Descriptive Functional Design d) None of the above 9) Which one is not a strategy for design ? a) Bottom up design b) Top down design c) Embedded design d) Hybrid design 10) The extent to which different modules are dependent upon each other is called ________________ a) Coupling b) Cohesion c) Modularity d) Stability B) State True or False : 4 1) Design patterns are best thought of as coding pattern. 2) Software design is an iterative generic process that may be applied without modification to any software project. 3) Fault is defect in a program or mistake in program or error in the program. 4) Level-0 data flow diagram is similar to the context diagram. 2. A) Write short note on following : 8 1) Design post processing 2) Project metrics. B) Answer the following : 1) Explain Metrics indicators. 2) Explain Object Oriented Testing. 6 *SLRCK3* -3- SLR-CK – 3 3. Answer the following : A) What are the advantages and disadvantages of prototyping model ? 7 B) Explain evolutionary software process model. 7 4. Answer the following : A) Explain MC Call’s Quality factors used in software engineering. 7 B) Explain function point metrics used in the analysis model. 7 5. Answer the following : A) What is meant by software requirement specification ? Explain the characteristics of good SRS. 7 B) Explain structured analysis in detail. 7 6. Answer the following : A) Explain the various strategies used for software testing. 7 B) Explain how we can manage object oriented software projects. 7 7. Answer the following : A) Explain functional modeling and behavioral modeling in detail. 7 B) What is software design ? Explain how we can transform informal design to a detailed design. 7 _____________________ SLR-CK 4 *SLRCK4* S N e o a t . M.Sc. (Part I) (Semester I) Examination, 2014 COMPUTER SCIENCE (Paper IV) Data Structures (New) Day and Date : Friday, 21-11-2014 Time : 11.00 a.m. to 2.00 p.m. Max. Marks : 70 Instructions : I) Q. 1 and Q. 2 are compulsory questions. II) Attempt any three questions from Q. 3 to Q. 7. III) Figures to right indicate full marks. 1. A) Choose the correct alternative : 10 1) The rule is therefore widely accepted that the associated ___________ is made explicit in a declaration of the constant, variable or function. a) Linked List c) Binary Tree b) Data Type d) Sentence Case 2) A one of the demerit of priority queue is that it may lead to a problem of ____________, which keeps elements of queue in indefinite blocking state. a) Fragmentation c) Starvation b) Compaction d) Data Hiding 3) A _____________ matrix indicates almost all its elements are zero. a) 3-Dimensional Matrix c) Multidimensional Matrix b) 2-Dimensional Matrix d) Sparse Matrix 4) A ______________ cells, uses pointers to link successive list elements as well as consisting of an element of the list and a pointer to the next cell on the list. a) Stack c) Tree b) Matrix d) Singly Linked 5) It is difficult to find a perfect _____________ that is a function that has no collisions. a) Indexing Function c) Hash Function b) Do While Loop d) Nested Function P.T.O. SLR-CK 4 -2- *SLRCK4* 6) A _____________ imposes a hierarchical structure on a collection of items. Familiar examples of _________________ are genealogies and organization charts. a) Linear Search b) Software c) Tree d) Queue 7) A _____________ algorithm is that it always chooses the closest vertex to the source among those whose _____________ is not yet known. a) Shortest path b) Dynamic Programming c) Backtracking d) None of these 8) A _____________ data structure used to evaluate _____________ expression. a) Queue and Algebraic b) Queue and Arithmetic c) Stack and Algebraic d) Stack and Arithmetic 9) If a binary tree of arithmetic expression needs to be traversed and result is in form that an operator is in between the operands, then its a _____________ traversing. a) Pre-order b) In-order c) Ascending d) Descending 10) The _____________, which is a finite sequence of instructions, each of which has a clear meaning ? a) Data structure b) Problem solver c) Algorithm d) Flowchart B) State True or False : 1) An Insertion Sort is a good example of Divide and Conquer. 4 2) A dynamic programming produces the answer far more rapidly than the try all permutations method. 3) The approach is called breadth-first because from each vertex that user visit as user search as broadly as possible by next visiting all the vertices adjacent to as well as each vertex visited is placed in the queue once. 4) This index is to be an integer between 0 and n-1, where n is the number of elements, the size, of the array. 2. A) Write a short note : 1) Backtracking 2) Multidimensional Array. 8 *SLRCK4* SLR-CK 4 -3- B) Answer the following : 6 1) What do you mean by Circular Queue ? 2) Define the term Data Structure. 3. Answer the following : A) Define the term Doubly Linked List. Explain in detail various operations on Doubly Linked List with suitable example. B) What do you mean by Binary Tree ? Generate a Binary tree from given series and show the results of Pre-order, In-order and Post-order traversing at constructed Binary tree. Series : 8, 91, 26, 83, 3, 12, 39, 5, 72, 100, 55, 60, 43, 10, 66. 7 7 4. Answer the following : A) Define the meaning of Queue ? Explain in detail Dequeue and operations on it with suitable example. 7 B) Enlist the various applications of stack. Discuss in detail the Tower of Hanoi problem and its solution with respect to following Initial and to achieve the shown Goal State. 7 (a) Initial State (b) Goal State 5. Answer the following : A) Define the term Sorting. Perform Bubble Sort and show the result in passes on following series : Series : 39, 200, 55, 6, 190, 49, 26, 133, 8, 69, 532, 13, 70. B) Discuss representations and applications of Single Dimensional and Two Dimensional with suitable example. 7 7 SLR-CK 4 -4- *SLRCK4* 6. Answer the following : A) State the algorithm for conversion of infix into postfix string. Apply the same on given infix expression show its conversion into postfix string. 7 Infix Expression : ((f + e) + b * (c + d) + a) * (h + g). B) What is the algorithm of Binary Search and Linear Search and also show the results of the both of the search on given series to find the digit 100 in it. 7 Series : 3, 10, 1, 613, 19, 100, 61, 35, 98, 13, 89, 77, 6, 55, 103. 7. Answer the following : A) What do you mean by Tree ? State and explain Breadth and Depth First search as a classical tree traversing algorithm with suitable example. 7 B) What is the Dijkstras algorithm ? Discuss how it will be useful for visiting all nodes shown in graph while not visiting each node twice but at least once. 7 _____________________ SLR-CK – 5 *SLRCK5* Seat No. M.Sc. – I (Semester – I) Examination, 2014 COMPUTER SCIENCE (Old) Object Oriented Programming Using C++ (Paper – I) Day and Date : Friday, 14-11-2014 Time : 11.00 a.m. to 2.00 p.m. Max. Marks : 70 Instructions : 1) Question No. 1 and 2 are compulsory. 2) Attempt any three questions from Q. No. 3 to Q. No. 7. 3) Figures to the right indicate full marks. 1. A) Choose correct alternatives: 10 1) Which of the following header file includes definition of cin and cout ? A) istream.h B) ostream.h C) iomanip.h D) iostream.h 2) Which of the following provides a reuse mechanism ? A) Abstraction B) Inheritance C) Dynamic binding D) Encapsulation 3) A constructor that accepts ________________ parameters is called the default constructor. A) One B) Two C) Three D) No 4) Destructor has the same name as the constructor and it is preceded by ________________ A) ~ B) | C) ? D) $ 5) Array indexing always starts with the number A) 1 B) 0 C) 2 D) – 1 P.T.O. SLR-CK – 5 *SLRCK5* -2- 6) Setprecision requires the header file ________________ A) stdlib.h B) iomanip.h C) console.h D) conio.h 7) Which of the following is user defined data type ? A) Public B) Private C) Class D) Both A) and B) 8) The static member variable is initialized to _____________ A) 0 B) 1 C) 2 D) 3 9) The mechanism that binds code and data together and keeps them secure from outside world is known as ________________ A) Abstraction B) Encapsulation C) Inheritance D) Polymorphism 10) What does your class can hold ? A) Data B) Function C) Both A) and B) D) None of these B) State whether following statements are True or False : 4 1) An inline function is a function that is expanded in line when it is invoked. 2) We cannot have virtual constructors, but we can have virtual destructors. 3) In operator overloading, we can change the basic meaning of an operator. 4) A destructor is used to destroy the object that have been created by constructor. 2. A) Write a short note on following : 8 i) Function overloading ii) Inline function. B) Answer the following : i) Define flowchart. Explain different symbols used in flowchart. ii) Explain primary data types used in C++. 6 *SLRCK5* -3- SLR-CK – 5 3. Answer the following : A) What is manipulator ? Explain the use of width ( ), precision and fill ( ) manipulators. 7 B) What is arrays of objects ? Explain with example. 7 4. Answer the following : A) Write a program in C++ to study parameterized constructor. 7 B) What is template ? Explain class template. 7 5. Answer the following : A) Write a C++ program to implement multilevel inheritance. 7 B) What do you mean by operator overloading ? Explain with suitable example. 7 6. Answer the following : A) What is virtual function ? Explain characteristics of virtual functions. 7 B) Explain various concepts of object oriented programming. 7 7. Answer the following : A) Define a file. Explain I/O commands in file handling. 7 B) Explain call by reference and return by reference with example. 7 –––––––––––––––––––– SLR-CK – 6 *SLRCK6* Seat No. M.Sc. – I (Semester – I) Examination, 2014 COMPUTER SCIENCE (Old) Paper – II : Numerical Analysis Day and Date : Monday, 17-11-2014 Time : 11.00 a.m. to 2.00 p.m. Instructions : i) ii) iii) iv) Max. Marks : 70 Question No. 1 and 2 are compulsory. Attempt any three questions from Q. No. 3 to Q. No. 7. Figures to the right indicate full marks. Use of simple or scientific calculator is allowed. 1. A) Select most correct alternative. 10 i) The next iterative value of the root of x2 – 4 = 0 using Newton-Raphson method, if the initial guess is 3, is a) 1.5 b) 2.067 c) 2.167 d) 3.000 ii) The number 02.56 × 104 has __________ significant digits. a) 3 b) 4 c) 5 d) 6 ⎡6 2 3 ⎤ iii) Given A = ⎢⎢0 1 2⎥⎥ then A is ____________ matrix. ⎢⎣0 0 6⎥⎦ a) a diagonal b) an identity c) an upper triangular d) a lower triangular iv) The truncation error in calculating f ′(2 ) for f(x) = x2 by f ′(x ) ≈ f (x + h) − f (x ) h with h = 0.2 is a) –0.2 b) 0.2 c) 4 d) 4.2 v) In composite Trapezoidal rule the number of segments n must be a) any positive integer b) an odd number c) an even number d) multiple of 3 P.T.O. SLR-CK – 6 *SLRCK6* -2- vi) (y ′′′)2 + 5 y ′ = 0 is a ___________ differential equation. a) first-degree, third-order b) third-degree, second-order c) third-degree, first-order d) second-degree, third-order vii) The finite difference y1 – y0, where yi = f(xi), is denoted by a) Δy 0 b) ∇y 0 c) δy 3 2 d) None of these viii) If p(x) = a0 + a1x, p(100) = 3/7 and p(101) = – 4/7 then a0 = __________ (approximately). a) 101.4 b) –101.4 c) 100.4 d) 100 ix) The techniques and methods for solving systems of linear algebraic equations belong to a) elimination approach b) iterative approach c) a) and b) d) neither a) nor b) x) The system of equations : 6x – 3y = 8, 2x – y = 5 has a) no solution b) unique solution c) two solutions d) many solutions B) Fill in the blanks : 4 i) The general solution of the differential equation y ′ = ae x is _________ ii) The three point Newton-cotes formula is __________ rule. iii) For the function x2 – 4x – 10 = 0 with initial estimates of x1 = 1 and x2 = 4, by using secant method the next estimate x3 will be __________ iv) If x0 = 4, x1 = 2 and f0 = 20, f1 = 10 then the first divided difference f[x 0 , x 1 ] = _________ 2. A) i) Define an absolute error. Three approximate values of the number 2/3 are given as 0.60, 0.66 and 0.67. Verify which of these three is the best approximation. ii) Define the operators Δ, ∇ and E . Show that E −1Δ ≡ ∇ . B) i) State mean-value theorem for derivatives. ii) State the Newton’s general interpolation formula. 4 4 3 3 *SLRCK6* SLR-CK – 6 -3- 3. A) Describe Gauss-Seidel method. 7 B) Find the value of 7 by using Newton-Raphson method and compare it with the value generated on calculator. 4. A) Explain Lagrange’s interpolation formula. 7 7 B) Solve the following system of equations by using Gauss elimination method. 3x1 + 6x2 + x3 = 16 2x1 + 4x2 + 3x3 = 13 x1 + 3x2 + 2x3 = 9 7 5. A) Write an algorithm of finding the root of f(x) = 0 by regula falsi method. B) From the following table, find the area bounded by the curve f(x) and the x-axis from x = 7.47 to x = 7.52 by using suitable rule. x 7.47 7.48 7.49 7.50 7.51 7.52 y = f(x) 1.93 1.95 1.98 2.01 2.03 2.06 6. A) Describe Simpson’s 1 rule. 3 7 7 7 B) Given the following information : x 1 3 7 8 y = f(x) 0 1.0986 1.9459 2.0794 Find f(5) by using Newton’s general interpolation formula. 7. A) Given the equation using h = 0.1. dy = xy with y(0) = 1. Estimate y(0.4) by Euler’s method dx 7 7 B) Given the following information : x y = f(x) 1 3 5 7 101 109 125 149 Find f(2.5) by using Newton’s forward difference interpolation formula. _____________________ 7 SLR-CK – 7 *SLRCK7* Seat No. M.Sc. – I (Semester – I) Examination, 2014 COMPUTER SCIENCE Software Engineering (Paper – III) (Old) Day and Date : Wednesday, 19-11-2014 Time : 11.00 a.m. to 2.00 p.m. Total Marks : 70 Instructions : 1) Question No. 1 and 2 are compulsory. 2) Attempt any three questions from Q. 3 to Q. 7. 3) Figures to the right indicates full marks. 1. A) Choose correct alternative : 10 1) The model in which the requirements are implemented by category is ______________ A) Evolutionary Development Model B) Waterfall Model C) Prototyping D) Iterative Enhancement Model 2) The following can be considered to quality A) Customer Satisfaction B) Defects C) Rework D) All of these 3) The level at which the software uses scarce resources is A) Reliability B) Efficiency C) Portability D) All of the above 4) What types of models are created during software requirements analysis ? A) Functional and behavioral B) Algorithmic and data structure C) Architectural and structural D) Usability and reliability 5) Requirements can be refined using A) The waterfall model B) Prototyping model C) The evolutionary model D) The spiral model P.T.O. SLR-CK – 7 -2- *SLRCK7* 6) Structured charts are a product of A) Requirements gathering B) Requirements analysis C) Design D) Coding 7) If a program in its functioning has not met user requirements in some way, then it is A) an error B) a failure C) a fault D) a defect 8) Which phase is not available in classic life cycle ? A) Coding B) Testing C) Maintenance D) Abstraction 9) Which is not a step of requirement engineering ? A) Requirements elicitation B) Requirements analysis C) Requirements design D) Requirements documentation 10) Pick odd man out. A) Waterfall B) RAD C) Prototype D) Design B) State True or False : 1) Software deteriorates rather than wears out because defects are more likely to arise after software has been used often. 2) Definition, development and support are the three generic phases of software engineering. 3) A key concept of quality control is that all work products have measurable specification for process outputs. 4) Software process is a Coherent set of activities for specifying, designing, implementing and testing software systems. 4 *SLRCK7* -3- SLR-CK – 7 2. A) Write short notes on the following : 8 i) Software characteristics. ii) Software Quality Assurance. B) Answer the following : 6 i) State the problems of prototyping. ii) State any three differences between Black box testing and White box testing. 3. Answer the following : 14 A) Explain the analysis principles in detail. B) Explain the Architectural design in detail. 4. Answer the following : 14 A) What is testing ? Explain the software testing strategies. B) Explain the User Interface Design with help of example. 5. Answer the following : 14 A) Explain the metric in process and project domains. B) Explain the control structure testing with example. 6. Answer the following : 14 A) Explain the Object Oriented Design in detail. B) Explain the mechanics of structured analysis in detail. 7. Answer the following : 14 A) Explain the different phases involved in waterfall life cycle. B) Explain the functional and behavioral modeling in detail. _____________________ SLR-CK – 8 *SLRCK8* Seat No. M.Sc. – I (Semester – I) Examination, 2014 COMPUTER SCIENCE Paper – IV : Data Structures (Old) Day and Date : Friday, 21-11-2014 Time : 11.00 a.m. to 2.00 p.m. Max. Marks : 70 Instructions : 1) Question No. 1 and 2 are compulsory. 2) Attempt any three questions Q. No. 3 to Q. No. 7. 3) Figures to right indicate full marks. 1. A) Choose correct alternatives : 10 i) The prefix form of the expression A/B/C is __________ a) /A/BC b) /AB/C c) //ABC d) /ABC/ ii) Some edges in the graph are directed and some are undirected such a graph is called as __________ a) Multi directed graph b) Mixed graph c) Multigraph d) All of above iii) The memory address of the first element of an array is called a) floor address b) foundation address c) first address d) base address iv) When new data are to be inserted into a data structure, but there is no available space; this situation is usually called a) underflow c) housefull b) overflow d) saturated v) The term “push” and “pop” is related to the a) array c) stacks b) lists d) all of above P.T.O. SLR-CK – 8 *SLRCK8* -2- vi) On which principle does stack work ? a) FOLI b) FIFO c) LILO d) LIFO vii) Which sorting technique is best performer in all the cases ? a) Selection sort c) Both (a) and (b) b) Heap sort d) None of the above viii) Which order is not used in traversing of tree ? a) Root, Left, Right b) Left, Root, Right c) Left, Right, Root d) Right, Left, Root ix) In which linked list, last node is pointing towards first node ? a) Circular list b) Doubly linked list c) Header linked list d) One way list x) Breadth First Search is used in a) Binary Search Tree b) Graph c) Stack d) Queue B) True/False : 4 i) Linked list is implemented using arrays ii) Can stack is described as pointer iii) A tree contains cycle iv) Tree is linear data structure. 2. A) Write short notes on following : 8 1) Analysis of algorithm 2) Priority queue. B) Answer the following : i) What are the properties of list structure ? Explain. ii) Explain recursion. 6 *SLRCK8* -3- SLR-CK – 8 3. A) What is hashing ? Explain hashing technique in detail. 14 B) Explain different types of arrays in detail. 4. A) Explain any one application of linked list with example. 14 B) What is graph ? Give adjacency matrix and path matrix for following graph. 5. A) Write C/C++ program to perform various operations on stack. 14 B) Explain applications of queue. 6. A) What is searching ? Explain linear search technique with example. 14 B) Write an algorithm to add new data at the end of doubly linked list. 7. A) Explain different way of traversing a binary tree with suitable example. B) Write an algorithm for bubble sort method. _____________________ 14 SLR-CK – 9 *SLR-CK-9* Seat No. M.Sc. – I (Semester – II) Examination, 2014 COMPUTER SCIENCE Operations Research (Paper – V) Day and Date : Saturday, 15-11-2014 Time : 11.00 a.m. to 2.00 p.m. Instructions : 1) 2) 3) 4) Max. Marks : 70 Attempt any five questions. Q. No. 1 and Q. No. 2 are compulsory. Attempt any three from Q. No. 3 to Q. No. 7. Figures to the right indicate full marks. 1. A) Choose correct alternative (one mark each) : 7 1) A simplex in two dimension is ______________ a) line b) triangle c) point d) tetrahedron 2) The boundary points of a convex set are always ______________ a) Extreme points b) Interior points c) Not extreme points d) None of these 3) A quadratic form Q(X) is positive definite iff a) XTQX > 0 b) XTQX ≥ 0 c) XTQX < 0 d) XTQX ≤ 0 4) While finding dual of any primal form, all constraints must be in ______________ form. a) ≤ b) ≥ c) = d) Any of these 5) If the primal problem has unbounded solution, then the dual problem will have ______________ solution. a) Finite solution b) Feasible solution c) No feasible solution d) Optimum solution P.T.O. SLR-CK – 9 *SLR-CK-9* -2- 6) Dual simplex method is applicable to those LPPs that start with a) an infeasible solution b) an infeasible but optimum solution c) a feasible solution d) a feasible and optimum solution. 7) The set C containing only single point is ______________ a) concave b) convex c) convex hull d) convex polyhedron B) Fill in the blanks (one mark each) : 7 1) If X is just eight vertices of a cube then the convex hull C(X) is ______________ 2) The element at the intersection of outgoing vector and incoming vector is called ______________ 3) If CX = Z defines hyperplane, for optimum value of Z this hyperplane is called ______________ 4) The simplex is an n-dimensional convex polyhedron having exactly ______________ vertices. 5) Constructing a Gomory’s constraints will mean geometrically that “______________” 6) The net evaluations ( Δ j’ s) corresponding to unit column vectors are always ______________ 7) Every point on the circumference of the circle is ______________ 2. a) Define : 3 i) Feasible solution ii) Basic solution iii) Basic feasible solution. b) P.T. A hyperplane in Rn is a convex set. 4 *SLR-CK-9* -3- SLR-CK – 9 c) Obtain the dual of following problem Min z = 2x1 + 3x2 + 4x3 Subject to the constraints, 2x1 + 3x2 + 5x3 ≥ 2 3x1 + x2 + 7x3 = 3 x1 + 4x2 + 6x3 ≤ 5, x1, x2, x3 ≥ 0. 3 d) State the formulas for finding the outgoing and incoming vector in dual simplex method. 4 3. a) Solve by simplex method Max z = 3x1 + 2x2 Subject to the constraints, x1 + x2 ≤ 4 x1 – x2 ≤ 2 and x1, x2 ≥ 0. b) Give the algorithm of Dual simplex method. 7 7 4. a) P.T. the collection of all feasible solutions to L.P. problem constitute a convex set whose extreme points correspond to the basic feasible solution. 7 b) Solve the following LPP by using Big-M method. Max. Z = – 2x1 – x2 Subject to the constraints, 3x1 + x2 = 3, 4x1 + 3x2 ≥ 6 x1 + 2x2 ≤ 4 and x1, x2 ≥ 0. 7 SLR-CK – 9 -4- *SLR-CK-9* 5. a) If the kth constraint of the primal is an equality then prove that the dual variable Wk is unrestricted in sign. b) The pay off matrix of a game is given. Find the solution of the game to player A and B. B III 0 1 I II IV V 5 3 I ⎡− 2 0 ⎢ 3 2 2 2 II A ⎢ 0 −2 6 III ⎢− 4 − 3 ⎢ 2 −6 IV ⎣ 5 3 − 4 7 7 ⎤ ⎥ ⎥ ⎥ ⎥ ⎦ 6. a) Construct the Kuhn-Tucker conditions for solving a quadratic programming problem. 7 b) Give the algorithm of Beale’s method to solve a quadratic programming problem. 7 7. a) Find the optimum integer solution to the following LPP. Max z = x1 + 2x2 Subject to the constraints, 2x2 ≤ 7 x1 + x2 ≤ 7 2x1 ≤ 11 and x1, x2 ≥ 0 and are integers. b) Give the computational procedure of finding the solution to LPP by Dual simplex method. _____________________ 8 6